===========================================================
                                      .___ __  __   
          _________________  __ __  __| _/|__|/  |_ 
         / ___\_` __ \__  \ |  |  \/ __ | | \\_  __\
        / /_/  >  | \// __ \|  |  / /_/ | |  ||  |  
        \___  /|__|  (____  /____/\____ | |__||__|  
       /_____/            \/           \/           
              grep rough audit - static analysis tool
                  v2.8 written by @Wireghoul
=================================[justanotherhacker.com]===
portsentry-1.2/portsentry_io.c-101-
portsentry-1.2/portsentry_io.c:102:  ipAddr = inet_addr(ignoreAddr);
portsentry-1.2/portsentry_io.c:103:  targetAddr = inet_addr(target);
portsentry-1.2/portsentry_io.c-104-  netmaskAddr = htonl (0xFFFFFFFF << (32 - ignoreNetmaskBits)); 
##############################################
portsentry-1.2/portsentry_io.c-473-
portsentry-1.2/portsentry_io.c:474:  CleanIpAddr (cleanAddr, target);
portsentry-1.2/portsentry_io.c-475-  snprintf(portString, MAXBUF, "%d", port);
##############################################
portsentry-1.2/portsentry_io.c-537-
portsentry-1.2/portsentry_io.c:538:  CleanIpAddr (cleanAddr, target);
portsentry-1.2/portsentry_io.c-539-  snprintf(portString, MAXBUF, "%d", port);
##############################################
portsentry-1.2/portsentry_io.c-596-
portsentry-1.2/portsentry_io.c:597:  CleanIpAddr (cleanAddr, target);
portsentry-1.2/portsentry_io.c-598-
##############################################
portsentry-1.2/portsentry_util.c-55-char *
portsentry-1.2/portsentry_util.c:56:CleanIpAddr (char *cleanAddr, const char *dirtyAddr)
portsentry-1.2/portsentry_util.c-57-{
##############################################
portsentry-1.2/portsentry_util.c-132-
portsentry-1.2/portsentry_util.c:133:  hostPtr = gethostbyaddr ((char *) &addr.s_addr, sizeof (addr.s_addr), AF_INET);
portsentry-1.2/portsentry_util.c-134-  if (hostPtr != NULL)
##############################################
portsentry-1.2/portsentry_util.h-25-char * SafeStrncpy (char *, const char *, size_t ); 
portsentry-1.2/portsentry_util.h:26:char * CleanIpAddr (char *, const char *);
portsentry-1.2/portsentry_util.h-27-int CleanAndResolve (char *, const char *);
##############################################
portsentry-1.2/ignore.csh-50-if ($OS == "Linux") then 
portsentry-1.2/ignore.csh:51:   foreach i ( `ifconfig -a | grep inet | awk '{print $2}' | sed 's/addr://'` )
portsentry-1.2/ignore.csh-52-      echo $i >> $SENTRYDIR/$TMPFILE
##############################################
portsentry-1.2/ignore.csh-59-         $OS == "SunOS 4.x" || $OS == "OSF1" || $OS == "IRIX") then
portsentry-1.2/ignore.csh:60:   foreach i ( `ifconfig -a | grep inet | awk '{print $2}'` )
portsentry-1.2/ignore.csh-61-      echo $i >> $SENTRYDIR/$TMPFILE
##############################################
portsentry-1.2/debian/examples/kill_cmd-9-MODE=${3/[sa]/}		# get rid of s and a
portsentry-1.2/debian/examples/kill_cmd:10:SERVICEINFO=`grep "[[:space:]]$2/$MODE" /etc/services` 
portsentry-1.2/debian/examples/kill_cmd-11-
portsentry-1.2/debian/examples/kill_cmd-12-# can we get some info about the attacker?
portsentry-1.2/debian/examples/kill_cmd:13:FINGERINFO=`/usr/sbin/safe_finger -l @$1 2>/dev/null`
portsentry-1.2/debian/examples/kill_cmd-14-
##############################################
portsentry-1.2/debian/examples/scan-detect-29-Portsentry has detected a portscan at $time 
portsentry-1.2/debian/examples/scan-detect:30:from the host `$target' and the port `$port'.
portsentry-1.2/debian/examples/scan-detect-31-
##############################################
portsentry-1.2/debian/scripts/portsentry-build-ignore-file-48-close( $th ) || die "Cannot close $tfname: $!\n";
portsentry-1.2/debian/scripts/portsentry-build-ignore-file:49:system( "/bin/mv","-f", $tfname, $ignore_file) && die "moving $ignore_file into place failed: $?\n";
portsentry-1.2/debian/scripts/portsentry-build-ignore-file-50-chmod( 0644, $ignore_file );